A New Vision for CISOs – Unprecedented Visibility of Your Attack Surface

In today’s complex security landscape, networks are getting larger and more complicated, creating myriad holes in defenses, while cyberattacks are increasing in sophistication and persistence. CISOs are challenged to centralize security and gain visibility over the attack surface, the ways in which their IT systems are vulnerable to threats, including potential attack vectors.

Organizations today are facing multiple challenges on providing an enhanced digital experience to their customers, whilst ensuring confidential data remains secure in accordance to evolving regulatory and compliance regimes. While APIs are the core of digital experiences, including single-page apps and mobile applications, traditional perimeter security architecture is no longer enough to protect your business and you must concurrently evolve your security approach.

In this webinar, Akamai will be sharing findings on how adopting a zero trust model will increase the security posture of organisation through a “Never Trust, Always Verify” paradigm. We will also look at how the API threat landscape have evolved and share best practises in API security.

Organizations need to:
•Deliver just the right data to the right tools.
•Drive consolidation across their security stack.
•Manage a common platform across physical, virtual and public cloud environments.

Hence, a next-generation network packet broker is required to deliver visibility to security tools focused on threat prevention, detection, analytics and forensics. The right tools get the right traffic at the right time, every time.

Attend this webinar to learn how to:
•Maximize tool performance and ROI by applying advanced traffic intelligence.
•Rapidly detect and respond to new threats while eliminating security tool sprawl.
•Have pervasive and consistent visibility across their physical, virtual and cloud infrastructure.

Join Gigamon and (ISC)² on Apr 18, 2018 (Wed) at 14:00 (Singapore time) to learn how to increase efficiency of your security stack.

As organizations embrace cloud infrastructure, DevOps methodologies, PAAS, IoT and mobile workforce, there are new risks coming from a broader attack surface. Vulnerability management designed for traditional assets is not enough. To improve security, you need to rethink how you do things. For example, containers have become the de facto standard in cloud architectures today, which means that security needs to move into developers’ build processes while complementing existing solutions.

Attend this webinar to discover:
•Where vulnerability management for today’s assets needs to start
•What the new faces of attacks and remediation look like
•Why prioritization should not be based on scan results
•Why reports using Excel are no longer the answer
•How DevOps can be part of the solution to incorporate security

Join Tenable and (ISC)² on Jan 24, 2018 (Wed) at 14:00 (Singapore time) to learn how to minimize cyber exposure in a world of cloud, containers and other modern assets.

As organizations migrate workloads to cloud computing, they benefit from flexibility and agility, but network security operations grow increasingly difficult.

Gaining visibility into cloud environments, extending existing security operations and workflows, ensuring compliance, and managing shared responsibility create new challenges for security professionals. Add to this the complexity of hybrid and multi-cloud environments — and the loss of control within those environments — and it’s no wonder security leaders are scratching their heads over how to best secure their organization’s journey to the cloud.

This session will look at approaches to addressing the many challenges around cloud security management and best practices for translating on-prem security controls and processes into hybrid and multi-cloud environments.

Join Skybox Security and (ISC)² on Jan 17, 2018 (Wed) at 14:00 Singapore time to learn more about security management in the cloud.

First in the Industry to deliver Deception, Mobile Threat Defense, and Endpoint Detection and Response (EDR) in a Single-Agent Architecture. Join us to learn the latest Evolution of Endpoint Security & Data Protection:

In recent years, we have seen large-scale botnets used to execute attacks rarely seen in the past -- botnets that incorporate new features and bigger capabilities than ever before. How and why some of these botnets remain resilient is a question that needs to be answered, and one of the reasons is Fast Flux. Fast Flux is a DNS technique used by botnets to hide various types of malicious activities (such as phishing, web proxying, malware delivery, and malware communication) behind an ever-changing network of compromised hosts acting as proxies. In general, a Fast Flux network is mostly used to make communication between malware and its command and control server (C&C) more resistant to discovery. Akamai’s high visibility to both Web and Enterprise traffic enables new and unique insights on the behavior of such Fast Flux networks.

In this webinar, you will get an in-depth analysis on:

- How network fluxing is using domains, IP addresses and even nameservers to become resistant to discovery
- How Fast Flux networks offer services such as malware communication and hosting of malicious content
- How botnets are used both for Fast Flux communications and a variety of Web attacks such as Web scraping and credential abuse
- Best practices for detecting and defending against such botnets

A recent survey conducted among security professionals in Australia, Singapore revealed that up to 95% of respondents said phishing is the #1 threat. Yet many acknowledged they’re unprepared to deal with phishing attacks.

Attend this webinar to learn why responders are drowning in emails instead of hunting real threats. See why they’re betting on automation whilst we know, tech alone won’t stop threats from getting through and wreaking serious havoc. Learn what rapid changes and investments your peers are planning to turn the tide against phishing and protect their organisations.

In this webinar, you will learn:

- How bad is the phishing threat?
- How confident are companies in their phishing responses?
- What solutions are companies using—and which ones should they add?
- How can automation and technology help? Why are humans important, too?
- How does your organisation compare to organisations in Australia, Singapore and other countries around the globe?

Join PhishMe and (ISC)² on Nov 15 (Wed) at 14:00 (Singapore time) and learn more about phishing incident response.

Credential abuse attacks have become a prevalent threat in recent years, and a successful credential abuse attack campaign can result in damaging consequences such as losing access and control over the accounts, data breach and fraudulent transactions.

Many of the accounts being abused are compromised account, which are the result of information breach in vulnerable web applications. The problem starts once visitors of highly-secured web applications create login credentials and then recycle those credentials to access another potentially vulnerable web application.

In this webinar, Akamai will present our latest research on malicious activity that sheds new light on credential abuse attack campaigns characteristics. The research reveals the techniques that are being used and what make these campaigns difficult to detect over long periods of time. We will show how collaboration of attack evidence on different targets can become a solution to mitigate such attacks.

The speakers will also share key attack data and trends observed from the latest Akamai Q2 2017 State of the Internet Security Report.

Frequent cyber security attacks spreading around the world and affecting systems everywhere has become the "new norm". Recent changes in IT architecture such as virtual, mobile & cloud services, plus increasingly sophisticated cyber threats are forcing enterprise security practices and principles to be re-evaluated. Analyst research data shows that system vulnerabilities are still the largest contributing factor in enterprise data breaches. Thus, identifying vulnerable systems on your network and applying mitigations to them must continue to be a strong priority.

This webinar will provide you with insight into how successful organisations have evolved their Vulnerability Management programs to gain a deeper understanding of their overall Security posture. The presentation will share ideas to boost the effectiveness of your security program now and in future, taking into account the major new IT paradigms including Cloud, Containers & DevOps.

Join Tenable and (ISC)² on July 19 (Wed) at 14:00 (Singapore time) to learn more about the evolution of vulnerability management.

Continuous delivery of application is the new norm. Businesses recognize that applications are a competitive differentiator so they are creating and pushing them out at a lightning pace, thus putting a lot of pressure on development and security teams. HPE Enterprise Security, together with Mainstay Partners, studied data collected from a broad set of Fortify customers to quantify the business value they are experiencing by building security into each phase of development.

Join HPE and (ISC)² on July 12 (Wed) at 13:00 (Singapore time) to learn about the key findings from the research. Discover the ROI of application security practices for your organization to scale confidently for business growth.

Threats from within the enterprise can pose the biggest cybersecurity risk to the organisation. Whether intentionally or accidentally, users with legitimate credentials can go about the network without triggering suspicion or alert, making their unauthorised activity difficult to detect. Insider threat activity can sometimes hide in plain sight, but what happens when people deliberately cover their tracks?

In this webinar, you will learn:

- Where to look for suspicious activity
- How to set up traps that will catch malicious insiders
- What finding paths across seemingly disparate data can reveal.

According to a 2016 industry report, employees cause 77 percent of internal security breaches. Find out who is causing yours.

Join Nuix’s and (ISC)² on Jun 28 (Wed) at 13:00 (Singapore time) and uncover the six hidden signs that help you detect the presence of insider threat activity.

Looking for expertise and information to advance your career and tackle your challenges? Subscribe and join us for the educational webinars in APAC time zone. Earn CPEs quickly and at no cost by attending webinars: 1 hour of webinar equals 1 CPE. We welcome members and non members alike.